Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05 to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.
The study was conducted at the fields of the Department of Horticulture and Landscape Gardening, College of Agriculture Engineering Sciences, University of Baghdad. During the spring 2017. All the recommended practices were followed during experimentation. The experimental material consisted four Genotype it is Batraa, Btera, Mosulle, and local selection. The experiment was applied in Randomized Complete Block Design (RCBD). The objectives of Study were to estimate the some genetic parameters and path coefficient for some traits Okra, The results of statistical analysis for these genotypes were highly significant differences for all traits except the traits number of leaves, the numbe
The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
Combining multi-model images of the same scene that have different focus distances can produce clearer and sharper images with a larger depth of field. Most available image fusion algorithms are superior in results. However, they did not take into account the focus of the image. In this paper a fusion method is proposed to increase the focus of the fused image and to achieve highest quality image using the suggested focusing filter and Dual Tree-Complex Wavelet Transform. The focusing filter consist of a combination of two filters, which are Wiener filter and a sharpening filter. This filter is used before the fusion operation using Dual Tree-Complex Wavelet Transform. The common fusion rules, which are the average-fusion rule and maximu
... Show MoreIn this work, a magnetic switch was prepared using two typesof ferrofluid materials, the pure ferrofluid and ferrofluid doped with copper nanoparticles (10 nm). The critical magnetic field (Hc) and the state of magnetic saturation (Hs) were studied using three types of laser sources. The main parameters of the magnetic switch measured using pure ferrofluid and He-Ne Laser source were Hc(0.5 mv, 0.4 G), Hs (8.5 mv, 3 G). For the ferrofluid doped with copper nanoparticles were Hc (1 mv, 4 G), Hs (15 mv, 9.6 G), Using green semiconductor laser for the Pure ferrofluid were Hc (0.5 mv, 0.3 G) Hs (15 mv, 2.9 G). While the ferrofluid doped with copper nanoparticles were Hc (0.5 mv, 1 G), Hs (12 mv, 2.8 G) and by using the violet semiconductor l
... Show MoreIn this research, optical communication coding systems are designed and constructed by utilizing Frequency Shift Code (FSC) technique. Calculations of the system quality represented by signal to noise ratio (S/N), Bit Error Rate (BER),and Power budget are done. In FSC system, the data of Nonreturn- to–zero (NRZ ) with bit rate at 190 kb/s was entered into FSC encoder circuit in transmitter unit. This data modulates the laser source HFCT-5205 with wavelength at 1310 nm by Intensity Modulation (IM) method, then this data is transferred through Single Mode (SM) optical fiber. The recovery of the NRZ is achieved using decoder circuit in receiver unit. The calculations of BER and S/N for FSC system a
... Show MoreOptimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment
... Show MoreThis research aims at studying the relation between fair value and the Financial Reports Quality to achieve a number of aims such as :-
1- Throw light on the problems of the measurement that depends on the historic cost as it paves the way towards the method of the fair value in the accounting measurement.
2-Give a general definition for fair value in the accounting via analyzing the theoretical aspects that relates the subject and the scientific bases on which the relating accounting treatment depend.
3- Exhibit the characteristics that could be added by the fair value to the accounting Information .
The study problem is summarized in that the e
... Show MorePhotocatalytic degradation of methylene blue was studied using CdS and ZnS as catalyst. The photocatalytic activity of the specimen was studied by exposing to UV-radiation. The result shows that the degradation efficiency of the dye for CdS micro-particles was 92% after 7 hours and for ZnS micro-particles was 88.29% for the same time interval.